In this paper we present a new randomized algorithm for SAT, i.e., the satisfiability problem for Boolean formulas in conjunctive normal form. Despite its simplicity, this algorithm performs well on many common benchmarks ranging from graph coloring problems to microprocessor verification. Our algorithm is inspired by two randomized algorithms having the best current worst-case upper bounds ([27,28] and [30,31]). We combine the main ideas of these algorithms in one algorithm. The two approaches we use are local search (which is used in many SAT algorithms, e.g., in GSAT [34] and WalkSAT [33]) and unit clause elimination (which is rarely used in local search algorithms). In this paper we do not prove any theoretical bounds. However, we present encouraging results of computational experiments comparing several implementations of our algorithm with other SAT solvers. We also prove that our algorithm is probabilistically approximately complete (PAC).
In this paper we present a new randomized algorithm for SAT, i.e., the satisfiability problem for Boolean formulas in conjunctive normal form. Despite its simplicity, this algorithm performs well on many common benchmarks ranging from graph coloring problems to microprocessor verification. Our algorithm is inspired by two randomized algorithms having the best current worst-case upper bounds ([27,28] and [30,31]). We combine the main ideas of these algorithms in one algorithm. The two approaches we use are local search (which is used in many SAT algorithms, e.g., in GSAT [34] and WalkSAT [33]) and unit clause elimination (which is rarely used in local search algorithms). In this paper we do not prove any theoretical bounds. However, we present encouraging results of computational experiments comparing several implementations of our algorithm with other SAT solvers. We also prove that our algorithm is probabilistically approximately complete (PAC).
Abstract. Very few known cryptographic primitives are based on noncommutative algebra. Each new scheme is of substantial interest, because noncommutative constructions are secure against many standard cryptographic attacks. On the other hand, cryptography does not provide security proofs that might allow the security of a cryptographic primitive to rely upon structural complexity assumptions. Thus, it is important to investigate weaker notions of security.In this paper, new constructions of cryptographic primitives based on group invariants are proposed, together with new ways to strengthen them for practical use. Also, the notion of a provable break is introduced, which is a weaker version of the regular cryptographic break. In this new version, an adversary should have a proof that he has correctly decyphered the message. It is proved that the cryptosystems based on matrix group invariants and a version of the Anshel-Anshel-Goldfeld key agreement protocol for modular groups are secure against provable break unless NP = RP. §1. Algebraic cryptography Public-key cryptography, since its very beginning [16,53], has been actively employing algebraic constructions. For example, the RSA protocol is based on number theory; the very construction of the protocol requires computing the Euler totient ϕ(n). Its security is based on factoring a number into prime divisors, or, more precisely, on the hardness of the so-called "RSA problem": find roots of a given degree modulo a number n = pq, where p and q are prime (this task may not be equivalent to factoring; see [14,54,15] for more information).However, the term algebraic cryptography is usually employed in a narrower meaning. Algebraic cryptography deals with constructions where encoding and decoding are both group homomorphisms. In [29], Grigoriev and Ponomarenko gave the following definition of a homomorphic cryptosystem (compare with Definition 2, where we introduce the general notion of a cryptosystem). Definition 1. Let H be a finite nonidentity group, G a finitely generated group, and f : G → H an epimorphism. Assume that R is a set of distinct representatives of the right cosets of ker(f ) in G, A is a set of words in some alphabet, and a mapping P : A → G satisfies Im(P ) = ker(f ). A triple S = (R, A, P ) is called a homomorphic cryptosystem over H with respect to f if the following conditions are satisfied:• random elements (of the sets A, G, H) can be generated, and the inverse of an element and the product of two elements (in the group G or H) can be computed2000 Mathematics Subject Classification. Primary 94A60, 68P25, 11T71.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.